V
verifying security policy, 247
versions of FW-1, earlier
compatibility settings, 203
Global Properties settings, 492 “493
upgrading from, 67 “68
viewing
ARPs that firewall is generating, 278
cluster status, 527
implied rules, 201 “202
License Repository, 206 “207
log data, 209 “210
modules installed, 212
option, security policy, 248
virtual links, configuring, 194
virtual private networks. See VPNs
Virtual Router Redundancy Protocol (VRRP), 520, 544
virus-scanning with CVP, 323
viruses
See also attacks, worms
blocking, 367
blocking Windows Fire Sharing, 38
Visual Policy Editor, integration with Policy Editor, 29
Voice over IP (VoIP) Protocols, 202
VPN-1 and SecureClient, 9
VPN-1/FireWall-1
components , integrating, 18 “30
configuring, 404
defining services with cphaprob command, 523 “524
described, using, 4 “8, 42 “43
encryption schemes, 434 “441
evaluation copy of, 46
firewall module described, 30 “37
fw commands, 404 “406, 526
moving data to another server for validation, 322 “331
Next Generation with Application Intelligence. See NG AI
NG AI and version 4.1, 7
SmartDefense update types, 565 “566
synchronization information, 526
uninstalling from Windows, 97 “104
upgrading from previous version, 67 “68
VPN client installation, 61
VPN domains
described, 440
overlapping, 534 “537, 540 “543
VPN Properties, configuring, 450 “451
VPN tunnels, maintaining high number of concurrent, 380
VPNs (virtual private networks)
configuring IKE, 441 “453
configuring remote clients with Packaging Tool, 499 “509
external network considerations, 456
IP addressing, 56
IPSec and, 513
logging and alerts, configuring, 415 “416
managing, 469
Multiple Entry Point configurations, 533 “543
organizations use of, 434
remote access configuration options, 484 “495
Single Entry Point configurations, 528 “533
testing, 453 “454
types of, 439 “440
VRRP (Virtual Router Redundancy Protocol), 520, 544
vulnerability assessment tools, 257